Question No: 121 – (Topic 2)

Refer to the exhibit You have received an advisory that your organization could be running a vulnerable product. Using the Cisco Systems Rapid Risk Vulnerability Model, you determine that * Your organization is running an affected product on a vulnerable version of code vulnerable component is enabled and there is no feasible workaround * There is medium confidence of an attack without significant collateral damage to the organization.

According to the model what is the appropriate urgency for remediation?

priority maintenance process

contact ISP to trace attack

no action required

remove vulnerable device from service

standard maintenance process

immediate mitigation process

Answer: E

Question No: 122 – (Topic 2)

Which two statements about the 3DES encryption protocol are true?(Choose two)

It can operate in the Electronic Code Book and Asymmetric Block Chaining modes.

Its effective key length is 168 bits.

It encrypts and decrypts data in three 64-bit blocks with an overall key length of 192 bits.

The algorithm is most efficient when it is implemented in software instead of hardware.

It encrypts and decrypts data in three 56-bit blocks with an overall key length of 168 bits.

Its effective key length is 112 bits.

Answer: E,F

Question No: 123 – (Topic 2)

Which command sequence can you enter to enable IP multicast for WCCPv2?

Question No: 127 – (Topic 2)

Which two options are system requirements for single sign-on on Cisco Unified Communications Manager? (Choose two)

OpenAM must be deployed in a different domain Microsoft Active Directory.

All participating entities must have their clocks synchronized.

The local user profile on Cisco Unified Communications must be disabled.

IWA and Kerberos authentication must be configured in the Windows domain.

Microsoft Active Directory must be deployed in a domain-based configuration.

Answer: B,E

Question No: 128 – (Topic 2)

Refer to the EXHIBIT .what is the effect of the given configuration?

It will Drop all TTL packet with a value of 14 in the IP header field.

It will Drop all TTL packet with a TTL value less than 14.

It will Drop all TTL packet with a TTL value of 15 or more.

It will Drop all TTL packet with a TTL value of 14 or more.

Answer: B

Question No: 129 – (Topic 2)

refer to the exhibit you executed the show crypto key mypubkeyrsa command to verify that the RSA key is protected and it generated the given output What command must you have entered to protect the key?